Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6502

Search results for: household food security

5932 Home-based Production of the Southern Dialect Dong Minority Women in Rural Hunan, China

Authors: Sze Wai Veera Fung, Peter W. Ferretto

Abstract:

Since the economic reform in 1980s, many men and women of the southern dialect Dong minority have migrated to coastal cities for employment. Responding to the outgoing providers of the families, women, especially those at the middle age, resort to the informal home-based services and goods production for income generation. Homework, therefore, becomes a key economic strategy in supporting the household expenses in rural China, where formal employment is often inadequate for local women. This paper seeks to examine the intersection between gender and household strategy in the broader economic context of rural China. Based on the interviews and site survey in Tongdao Dong Autonomous County, the study analyses the variety of the home-based production activities, the experience of women in the production process, and the impact on familial relation and gender division of labor at home. The objective of this research is to advance the understanding of the informal economic landscape in the contemporary rural China, through which an alternative and possibly a more appropriate mode of development can be investigated.

Keywords: gender relation, home-based production, household strategy, informal economy, rural China, dong minority

Procedia PDF Downloads 117
5931 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 118
5930 Development and Evaluation of a Calcium Rich Plant-Based Supplement on Bone Turnover of Peri and Post Menopausal Women

Authors: Gayathri.G, Hemamalini.A.J, Chandrasekaran.A

Abstract:

Problem statement: Nutritional deficiency, especially calcium, may lead to poor bone formation and mineralization. Although there are plenty of synthetic supplements available, it is essential to make a calcium rich food supplement accessible to combat calcium deficiency that could be readily prepared at the household level. Thus the current study aimed to formulate and standardize an indigenous low-cost calcium-rich food supplement and to study the impact of supplementation on the bone resorption and formation markers. Methods: A Randomized controlled trial was conducted with 60 subjects distributed equally in control and experimental groups, including perimenopausal and postmenopausal women. A plant-based calcium-rich product was developed and supplemented in form of balls as a midmorning and evening snack by addition of optimized proportions of leaves of Sesbania Grandiflora, seeds of Sesamum indicum, Eleusine coracana, Glycine max, Vigna mungo for a period of 6 months. Postmenopausal and perimenopausal women received 1200mg and 800mg of calcium per day from the supplemented, respectively. Outcome measures like serum calcium; betacrosslaps (bone resorption marker) and total P1NP (bone absorption marker) were assessed after 3 months and after 6 months. Results: There were no significant changes seen in the serum calcium and total P1NP levels (bone formation marker) among the subjects during the supplementation period. The bone resorption marker (betacrosslaps) reduced in all the groups and the reduction (0.32 ± 0.130 ng/ml to 0.25 ± 0.130 ng/ml) was found to be statistically highly significant (p < 0.01) in experimental group of perimenopausal subjects and significant (p < 0.05) in experimental group of postmenopausal subjects (1.11 ± 0.290 ng/ml to 0.42 ± 0.263 ng/ml). Conclusion: With the current severe calcium deficiency in the Indian population, integrating low-cost, calcium-rich native foods that could be readily prepared at household level would be useful in raising the nutritional consumption of calcium, which would, in turn, decrease bone turnover.

Keywords: calcium, sesbania grandiflora, sesamum indicum, eleusine coracana, glycine max, vigna mungo, postmenopause, perimenopause, bone resorption, bone absorption, betacrosslaps, total P1NP

Procedia PDF Downloads 121
5929 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 119
5928 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 103
5927 Comparison of Different Extraction Methods for the Determination of Polyphenols

Authors: Senem Suna

Abstract:

Extraction of bioactive compounds from several food/food products comes as an important topic and new trend related with health promoting effects. As a result of the increasing interest in natural foods, different methods are used for the acquisition of these components especially polyphenols. However, special attention has to be paid to the selection of proper techniques or several processing technologies (supercritical fluid extraction, microwave-assisted extraction, ultrasound-assisted extraction, powdered extracts production) for each kind of food to get maximum benefit as well as the obtainment of phenolic compounds. In order to meet consumer’s demand for healthy food and the management of quality and safety requirements, advanced research and development are needed. In this review, advantages, and disadvantages of different extraction methods, their opportunities to be used in food industry and the effects of polyphenols are mentioned in details. Consequently, with the evaluation of the results of several studies, the selection of the most suitable food specific method was aimed.

Keywords: bioactives, extraction, powdered extracts, supercritical fluid extraction

Procedia PDF Downloads 229
5926 Strategies to Accelerate Indonesian Halal Food Export to the Japan Market

Authors: Ferry Syarifuddin

Abstract:

The potential for growth in the Japanese halal industry is promising, especially for the export of processed food products, due to the significant increase in the Muslim population over the past decade. Japan is also the second largest destination for processed food export from developing countries. However, there has been a decline in the export of processed food from Indonesia, a Muslim-majority developing country, to Japan, dropping from $350 million in 2019 to $119 million in 2023. To address this issue, this study aims to assess the strengths, weaknesses, opportunities, and threats (SWOT) of Indonesian halal processed food products export to the Japanese market, investigate successful strategies employed by other countries and recommend the most prioritized strategy for exporting Indonesian halal processed food products to the Japan market. Our findings identify collaborating with Japan's food industry associations and trade organizations as the key strategy for successful export to the Japanese market.

Keywords: ANP-SWOT, export strategy, halal product, Japan market

Procedia PDF Downloads 32
5925 Managing Education through, Effective School Community Relationships/Participation for National Security

Authors: Shehu S. Janguza

Abstract:

The need for national security cannot be over Emphasis, which should be pursued by any means. Thus the need for effective management of education through effective school community Relationship/participation. In preparing and implementing only effort to promote community involvement in manning Education, it is importance to understand the whole picture of community participation, how it works, what forms are used, what benefit it can yield and what we should expect in the process of carrying out the efforts finally emphasis will be made on how effective school community relationship/participation and lead to national security.

Keywords: community participation, managing, school community, national security

Procedia PDF Downloads 586
5924 Application of Host Factors as Biomarker in Early Diagnosis of Pulmonary Tuberculosis

Authors: Ambrish Tiwari, Sudhasini Panda, Archana Singh, Kalpana Luthra, S. K. Sharma

Abstract:

Introduction: On the basis of available literature we know that various host factors play a role in outcome of Tuberculosis (TB) infection by modulating innate immunity. One such factor is Inducible Nitric Oxide Synthase enzyme (iNOS) which help in the production of Nitric Oxide (NO), an antimicrobial agent. Expression of iNOS is in control of various host factors in which Vitamin D along with its nuclear receptor Vitamin D receptor (VDR) is one of them. Vitamin D along with its receptor also produces cathelicidin (antimicrobicidal agent). With this background, we attempted to investigate the levels of Vitamin D and NO along with their associated molecules in tuberculosis patients and household contacts as compared to healthy controls and assess the implication of these findings in susceptibility to tuberculosis (TB). Study subjects and methods: 100 active TB patients, 75 household contacts, and 70 healthy controls were taken. VDR and iNOS mRNA levels were studied using real-time PCR. Serum VDR, cathelicidin, iNOS levels were measured using ELISA. Serum Vitamin D levels were measured in serum samples using chemiluminescence based immunoassay. NO was measured using colorimetry based kit. Results: VDR and iNOS mRNA levels were found to be lower in active TB group compared to household contacts and healthy controls (P=0.0001 and 0.005 respectively). The serum levels of Vitamin D were also found to be lower in active TB group as compared to healthy controls (P =0.001). Levels of cathelicidin and NO was higher in patient group as compared to other groups (p=0.01 and 0.5 respectively). However, the expression of VDR and iNOS and levels of vitamin D was significantly (P < 0.05) higher in household contacts compared to both active TB and healthy control groups. Inference: Higher levels of Vitamin D along with VDR and iNOS expression in household contacts as compared to patients suggest that vitamin D might have a protective role against TB which prevents activation of the disease. From our data, we can conclude that decreased vitamin D levels could be implicated in disease progression and we can use cathelicidin and NO as a biomarker for early diagnosis of pulmonary tuberculosis.

Keywords: vitamin D, VDR, iNOS, tuberculosis

Procedia PDF Downloads 294
5923 A Short Survey of Integrating Urban Agriculture and Environmental Planning

Authors: Rayeheh Khatami, Toktam Hanaei, Mohammad Reza Mansouri Daneshvar

Abstract:

The growth of the agricultural sector is known as an essential way to achieve development goals in developing countries. Urban agriculture is a way to reduce the vulnerability of urban populations of the world toward global environmental change. It is a sustainable and efficient system to respond to the environmental, social and economic needs of the city, which leads to urban sustainability. Today, many local and national governments are developing urban agriculture as an effective tool in responding to challenges such as poverty, food security, and environmental problems. In this study, we follow a perspective based on urban agriculture literature in order to indicate the urban agriculture’s benefits in environmental planning strategies in non-western countries like Iran. The methodological approach adopted is based on qualitative approach and documentary studies. A total of 35 articles (mixed quantitative and qualitative methods studies) were studied in final analysis, which are published in relevant journals that focus on this subject. Studies show the wide range of positive benefits of urban agriculture on food security, nutrition outcomes, health outcomes, environmental outcomes, and social capital. However, there was no definitive conclusion about the negative effects of urban agriculture. This paper provides a conceptual and theoretical basis to know about urban agriculture and its roles in environmental planning, and also conclude the benefits of urban agriculture for researchers, practitioners, and policymakers who seek to create spaces in cities for implementation urban agriculture in future.

Keywords: urban agriculture, environmental planning, urban planning, literature

Procedia PDF Downloads 130
5922 A Study of Food Waste Behaviours in Restaurants

Authors: Ching-Hsu Huang, Si-Qing Hong

Abstract:

The main purpose of this study is to understand the consumers’ perceptions and attitudes toward food waste in restaurants. The questionnaires were conducted as a research tool to collect data to understand consumers’ food waste behaviors and the most food wasted in terms of their preparation in the restaurant. The subjects were the consumers in the restaurants and asked to fill out the questionnaire, including social responsibility, attitude, behavioral intention and food waste behaviors. 89 questionnaires were collected and the data were analyzed by reliability, descriptive analysis, t-test and ANOVA. The five hypotheses were examined and the results showed there is a significant relationship between social responsibility and behavioral intention; social responsibility and attitude, attitude and behavioral intention. The suggestions and implications were addressed for restauranteurs and further research.

Keywords: food waste behaviors (FWB), social responsibility, consumer attitude, behavioral intention, restaurants

Procedia PDF Downloads 160
5921 Impact of Different Ripening Accelerators on the Microbial Load and Proximate Composition of Plantain (Musa paradisiaca) and Banana (Musa sapientum), during the Ripening Process, and the Nutrition Implication for Food Security

Authors: Wisdom Robert Duruji, Oluwasegun Christopher Akinleye

Abstract:

This study reports on the impact of different ripening accelerators on the microbial load and proximate composition of plantain (Musa paradisiaca) and Banana (Musa sapientum) during the ripening process, and the nutrition implication for food security. The study comprised of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening accelerator was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating and enumerating their micro flora using pour plate method; and also, their proximate composition was determined using standard methods. The result indicated that the bacteria count of plantain increased from 3.25 ± 0.33 for unripe to 5.31 ± 0.30 log cfu/g for (treated) ripened, and that of banana increased from 3.69 ± 0.11 for unripe to 5.26 ± 0.21 log cfu/g for ripened. Also, the fungal count of plantain increased from 3.20 ± 0.16 for unripe to 4.88 ± 0.22 log sfu/g for ripened; and that of banana increased from 3.61 ± 0.19 for unripe to 5.43 ± 0.26 for ripened. Ripened plantain fingers without any ripening accelerator (control) had significantly (p < 0.05) higher values of crude protein 3.56 ± 0.06%, crude fat 0.42 ± 0.04%, total ash 2.74 ± 0.15 and carbohydrate 31.10 ± 0.20; but with significantly lower value of moisture 62.14 ± 0.07% when compared with treated plantain. The proximate composition trend of treated and banana fingers control is similar to that of treated and plantain control, except that higher moisture content of 75.11 ± 0.07% and lesser protein, crude fat, total ash and carbohydrate were obtained from treated and ripened banana control when the treatments were compared with that of plantain. The study concluded that plantain is more nutritious (mealy) than a banana; also, the ripening accelerators increased the microbial load and reduced the nutritional status of plantain and banana.

Keywords: food nutrition, calcium carbide, rvingia gabonensis, newbouldia laevis, plantain, banana

Procedia PDF Downloads 306
5920 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 52
5919 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 71
5918 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 385
5917 Gender Equity in Everyday Lives: A Case Study from New Delhi, India

Authors: Shrutika Lakshmi

Abstract:

Gender inequality has been quite evident particularly in the third world economies in different domains like health, education, marriages and personal freedom. Women’s exercise to personal freedom is driven by their financial standing in third world social milieu. However, even after decades of attempt to achieve a socio-economic standing equal to men, their attempts have failed in registering success.This research has been conducted in the national capital of India New Delhi aiming to reflect upon the gendered relations in society on the category of employed women. This particular category of women have been chosen for the study in order to study the gender relations, subordination of such women in household despite having an economic standing of their own, etc. The methodology used for this study is semi-structured interview along with qualitative analysis. Moreover, with the help of direct interaction with these women, we get insight into the kind of gendered relations prevailing inside the household structure which have their roots in age old customs and stereotype of the social milieu. Most importantly, the highlight of the study remains on the point where the hierarchy remains in the subconscious of these women and they never forget their social standing. It has been interesting to note that how even after contributing to the family income successively, their position remains subjugated in front of their male counterparts and thus, they are not ‘free’ in the real sense of the term. Even after attaining an economically stable position, these women did not enjoy the same comfort and freedom of choice as their male counterparts do, this could be gauged from the fact that when asked about ‘time for one’s own self’ they had no sense of it. This is astonishing in today’s world where every individual works and strives for a better livelihood and quality existence. Such findings reflect upon the reality of our society where women are still subjugated and duty bound towards the household even after having the same economic stand as their male counterparts. The burden of household chores and responsibilities fall solely on the shoulders of a women despite being an employed women even in the present times. Cooperation comes primarily from female members of the household and not from males. And thus, we as a society are far away from gender equity. We still suffer from prejudices and stereotypes which prevent us from giving same respect to women which we keep reserved for the man. Given this scenario, it seems, gender equity is a distant goal which we will have to keep striving for even harder even after decades of feminist struggles all over the world.

Keywords: employed women, subjugation in household, gender hierarchy, financial independence,

Procedia PDF Downloads 143
5916 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 113
5915 Microfinance and Women Empowerment in Bangladesh: Impact in Economic Dimension

Authors: Abm Mostafa, Rumbidzai Mukono, Peijie Wang

Abstract:

Using 285 respondents from two microfinance institutions, this research aims to assess the impact of microfinance on women’s economic empowerment in Bangladesh. Empirical measures of economic empowerment used in this paper are underpinned by a bargaining theory of household. Questionnaire is used for data collection following purposive sampling. Descriptive statistics, chi-square test, Kruskal-Wallis test, binary, and ordinal logistic regressions are deployed for data analysis. The findings of this study show that around three quarters of respondents have increased household income. They have increased their savings overwhelmingly; nonetheless, many of them are found to have a very small amount of savings. Still, more than half of the respondents are reported to have increased their savings when it is checked against at least 500 BDT per month. On the contrary, the percentage of women is moderate in terms of increasing control over finances. Empirical findings demonstrate the evidence of a relationship between the amount of loan and women’s household income, their savings, and control over finances. Nonetheless, no relationship is found in women’s areas. This study infers that women’s access to financial resources is fundamental to empower them in economic dimension.

Keywords: microfinance, women, economic, empowerment, Bangladesh

Procedia PDF Downloads 120
5914 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique

Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis

Abstract:

Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.

Keywords: children malnutrition, food security, Local community, participatory approach

Procedia PDF Downloads 264
5913 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 367
5912 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 95
5911 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 221
5910 Analysis on the Importance and Direction of Change in Residential Environment of Apartment with the Change of Population Structure

Authors: Jo, Eui Chang, Shin, Heekang, Mun, A. Young , Kim, Hong Kyu

Abstract:

Regarding change on population and family structure in Korea after the 1980s, there has been a rapid change of low fertility, graying and increase of single household that cannot be found in any other parts of the world. With the result of total population residence by the National Statistical Office, Korea will hold 52,160,065 people in 2030 and reduction is predicted and from 2025 people above the age of 65 will take 20% of the total population, which means the entry of a super aging society. Also, average number in a family will be 2.71 in 2015 and decrease to 2.33 in 2035. On the other hand, proportion of single and two person household will be 53.7% in 2015 and it will increase up to 68.4% in 2035. Old population will increase greatly, single and two person household will take 2/3 of the total households. Delphi research was processed in 3 steps on 40 professionals about the importance and changing factors of residential environment of apartment followed by the change of population structure. For interior plan, space variety, variability, safety, convenient installation, eco-friendly installation, and IT installation were important factors for construction plan, plan on aged and single households, convenient installation, safety installation, eco-friendly installation for subdivision plan, education/child care facility, parks/gymnasium facility, community facility, and accessibility of transportation were predicted as important factors.

Keywords: change of population structure, super-graying, change of residential environment of apartment, single household, interior plan, construction plan, subdivision plan, Delphi research

Procedia PDF Downloads 424
5909 Ethnic Food Consumption: Experiencing Consumer Animosity and Racism on the Front

Authors: Rana Muhammad Ayyub, Muhammad Bilal, Tahir Mahmood

Abstract:

In multicultural societies, food preferences are taking dimensions in both minorities as well as majority ethnic groups. The food consumption behavior of minority ethnic groups has been studied adequately; however, this paper intends to study the consumer behavioral dimensions of majority ethnic groups regarding Halal foods (a minority-related food) in the USA. In this quantitative study, the online questionnaire survey (n=223) was collected through surveymonkey.com from non-Muslims living in various cities in the USA through random sampling. The theory of consumer animosity was a theoretical underpinning. The validated scales were adopted and adapted for all constructs. AMOS 24 was used to apply structural equation modelling (SEM) to the data. Among the majority of ethnic groups, it was found that consumer racism (β= -25) and consumer animosity (β= - 27) negatively affect intention to choose Halal foods, whereas food neophobia has a positive effect (β=36) on this intention. This study will prove instrumental in removing the blame of “Marketing Myopia” from marketing academics and will highlight the importance of prevalent market realities for one of the fastest growing ethnic food markets, i.e., Halal of the world. It has practical implications for Halal food marketers in particular and other ethnic food marketers in general.

Keywords: consumer racism, animosity, Halal foods, ethnic consumption, food neophobia

Procedia PDF Downloads 87
5908 Reflection of Development of Production Relations in Museums: Case of Gobustan Museum

Authors: Fikrat Abdullayev, Narmin Huseynli

Abstract:

Archaeology is a science that learns ancient people’s life and household on the basis of samples of material culture. The key research object of this science is artefacts, which are acquired during archaeological excavations. These artefacts can be seen in museums. Museums are the main institutions that give impressions of daily life and household of people in ancient times. Therefore, systematization, exhibition and presentation of archaeological items in museums should be adapted to trace the development of productive forces and its reflection on the household of people. In Gobustan museum which was commissioned in 2011, you can get information about the life and household, as well as religious beliefs, of people at all stages of history from the end of the Upper Palaeolith to the Middle Ages through archaeological items, rock inscriptions and modern technologies. The main idea of museum exposition is to give an idea to visitors about the environment, society and production relations during the Stone and Metal Age. Stimulation of development of production factors and production relationships of environmental factors that are influenced by natural forces can be easily seen through exhibits of Gobustan Museum. At the same time, creating of new ideological attributes in the changing society and the process of transforming people into a dominant position in a belief system can be seen in the substitution of motives of rock carvings in the chronological context. The historical and cultural essence of rock carvings in Gobustan Museum is demonstrated through modern technological means and traditional museum concepts. In addition, Gobustan Preserve is one of the rare places where visitors can directly contact with rock carvings.

Keywords: Gobustan, rock art, museum, productive forces

Procedia PDF Downloads 497
5907 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 130
5906 Agroforestry Systems: A Sustainable Strategy of the Agricultural Systems of Cumaral (Meta), Colombia

Authors: Amanda Silva Parra, Dayra Yisel García Ramirez

Abstract:

In developing countries, agricultural "modernization" has led to a loss of biodiversity and inefficiency of agricultural systems, manifested in increases in Greenhouse Gas Emissions (GHG) and the C footprint, generating the susceptibility of systems agriculture to environmental problems, loss of biodiversity, depletion of natural resources, soil degradation and loss of nutrients, and a decrease in the supply of products that affect food security for peoples and nations. Each year agriculture emits 10 to 12% (5.1 to 6.1 Gt CO2eq per year) of the total estimated GHG emissions (51 Gt CO2 eq per year). The FAO recommends that countries that have not yet done so consider declaring sustainable agriculture as an essential or strategic activity of public interest within the framework of green economies to better face global climate change. The objective of this research was to estimate the balance of GHG in agricultural systems of Cumaral, Meta (Colombia), to contribute to the recovery and sustainable operation of agricultural systems that guarantee food security and face changes generated by the climate in a more intelligent way. To determine the GHG balances, the IPCC methodologies were applied with a Tier 1 and 2 level of use. It was estimated that all the silvopastoral systems evaluated play an important role in this reconversion compared to conventional systems such as improved pastures. and degraded pastures due to their ability to capture C both in soil and in biomass, generating positive GHG balances, guaranteeing greater sustainability of soil and air resources.

Keywords: climate change, carbon capture, environmental sustainability, GHG mitigation, silvopastoral systems

Procedia PDF Downloads 107
5905 Incidence of Listeria monocytogenes in Ready-To-Eat Food Sold in Johannesburg, South Africa

Authors: Hattie Hope Makumbe, Bhekisisa Dlamini, Frederick Tabit

Abstract:

Listeria monocytogenes is one of the most important foodborne pathogens associated with ready-to-eat (RTE) food. This study investigated the incidence of Listeria monocytogenes in 80 RTE food sold in the formal (dairy and processed meat) and informal markets (vegetable salads, beef stew, and rice) of Johannesburg, South Africa. High Enterobacteriaceae, S. aureus, and E. coli counts were obtained, which ranged from 1.9-7.5 log CFU/g. Listeria monocytogenes microbial counts in the food samples ranged from 3.5-6.0 log colony forming unit per gram except in cooked rice. The Listeria monocytogenes isolates were identified using biochemical tests and confirmed with the Biolog identification system and PCR analyses. The percentage incidence for Listeria monocytogenes in ready to eat food was 12.5%. When Minimum Inhibitory Concentrations were under consideration, all disinfectants were effective against Listeria monocytogenes strains. For antimicrobial work, rates of resistance amongst the antibiotics ranged from 17-100%. Therefore, more effective preventive control strategies for Listeria monocytogenes are needed to reduce the prevalence of the pathogen in RTE food that is sold in Johannesburg.

Keywords: Listeria monocytogenes, Listeria species, ready to eat food, sanitiser efficacy

Procedia PDF Downloads 153
5904 Traditional Practices and Indigenous Knowledge for Sustainable Food Waste Reduction: A Lesson from Africa

Authors: Gabriel Sunday Ayayia

Abstract:

Food waste has reached alarming levels worldwide, contributing to food insecurity, resource depletion, and environmental degradation. While numerous strategies exist to mitigate this issue, the role of traditional practices and indigenous knowledge remains underexplored. There is a need to investigate how these age-old practices can contribute to sustainable food waste reduction, particularly in the African context. This study explores the potential of traditional practices and indigenous knowledge in Africa to address this challenge sustainably. The study examines traditional African food management practices and indigenous knowledge related to food preservation and utilization; assess the impact of traditional practices on reducing food waste and its broader implications for sustainable development, and identify key factors influencing the continued use and effectiveness of traditional practices in contemporary African societies. Thus, the study argues that traditional practices and indigenous knowledge in Africa offer valuable insights and strategies for sustainable food waste reduction that can be adapted and integrated into global initiatives This research will employ a mixed-methods approach, combining qualitative and quantitative research techniques. Data collection will involve in-depth interviews, surveys, and participant observations in selected African communities. Moreover, a comprehensive review of literature on traditional food management practices and their impact on food waste reduction will be conducted. The significance of this study lies in its potential to bridge the gap between traditional knowledge and modern sustainability efforts. By uncovering the value of traditional practices in reducing food waste, this research can inform policies, interventions, and awareness campaigns aimed at achieving sustainable food systems worldwide.

Keywords: traditional practices, indigenous knowledge, food waste reduction, sustainability

Procedia PDF Downloads 59
5903 Inventory Optimization in Restaurant Supply Chain Outlets

Authors: Raja Kannusamy

Abstract:

The research focuses on reducing food waste in the restaurant industry. A study has been conducted on the chain of retail restaurant outlets. It has been observed that the food wastages are due to the inefficient inventory management systems practiced in the restaurant outlets. The major food items which are wasted more in quantity are being selected across the retail chain outlets. A moving average forecasting method has been applied for the selected food items so that their future demand could be predicted accurately and food wastage could be avoided. It has been found that the moving average prediction method helps in predicting forecasts accurately. The demand values obtained from the moving average method have been compared to the actual demand values and are found to be similar with minimum variations. The inventory optimization technique helps in reducing food wastage in restaurant supply chain outlets.

Keywords: food wastage, restaurant supply chain, inventory optimisation, demand forecasting

Procedia PDF Downloads 79